hackvertor / shadow-repeaterLinks
☆37Updated last month
Alternatives and similar repositories for shadow-repeater
Users that are interested in shadow-repeater are comparing it to the libraries listed below
Sorting:
- Burp extension to check and exploit the IIS Tilde Enumeration/IIS 8.3 Short Filename Disclosure vulnerability☆60Updated 2 years ago
- Make better use of the embedded browser that comes by default with Burp☆44Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 6 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Nuclei templates for source code analysis. Detects hardcoded secrets, config leaks, debug endpoints. Also helps identify OWASP Top 10 iss…☆67Updated last month
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 11 months ago
- Mine URLs from Browser's Heap Snapshot for fun and profit☆63Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆77Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 5 months ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- ☆26Updated 2 years ago
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Updated 11 months ago
- AI Substitutor is an extension for Burp Suite that uses AI functionality to substitute values of HTTP request parameters and headers.☆27Updated 3 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆55Updated 9 months ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- Bcheck scripts for Burp☆29Updated 11 months ago
- My talks...☆25Updated 5 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆88Updated last year
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆30Updated 8 months ago
- A set of open-source community scripts☆63Updated 9 months ago
- Web cache poisoning vulnerability scanner.☆72Updated 3 years ago
- ☆38Updated 2 years ago
- Progress Telerik Report Server pre-authenticated RCE chain (CVE-2024-4358/CVE-2024-1800)☆77Updated last year
- Bounty Prompt is an Open-Source Burp Suite extension by Bounty Security that leverages advanced AI via Burp AI and Groq AI. It enables us…☆97Updated 5 months ago
- Additional resources for leaking and exploiting ObjRefs via HTTP .NET Remoting (CVE-2024-29059)☆89Updated last year
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 2 months ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆33Updated 2 years ago
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆44Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year